If you have root access to a linux server and you don’t have the root mysql password, but need it, then you can easily reset the root mysql password in just a few commands. These commands probably differ depending on what linux distro you use. I was using Ubuntu 9.04 (Jaunty Jackalope) when I wrote this.

Now we restart the mysql server with the ‘skip-grant-tables’ option which basically allows anyone to do whatever they like. It’s usually preferable to include the ‘skip-networking’ option so that only localhost (you) have access to the naked database.

I spent awhile after work today trying to figure out why my mapped drives in windows weren’t working. I kept getting “MSHOME is not accessible” which was annoying because I wanted to watch some cartoons. Turns out that I booted my Linux box first and it became the master browser so I had to turn off my samba server and allow the windows xp machine to become the master browser. I found this out by using these commands and tools.

Those commands can be helpful at times but I found that they do not give enough information about the computer browsing services.

I found a tool called Browstat that you can download for free that gives you the clues to properly debug your windows network. Once you’ve downloaded that file and put it in your C:\Windows folder you’re going to want to open up a command window and type: browstat status.
This will give you most of the information that you need to debug your network.

If anyone knows about any other great networking tools like browstat I would really like to know about them.

ChelleChelle writes “This article examines the limitations of the sockets API. The Internet and the networking world in general have changed in very significant ways since the sockets API was first developed in 1982, but the API has had the effect of narrowing the ways in which developers think about and write networked applications. This article discusses the history as well as the future of the sockets API, focusing on how ‘high bandwidth, low latency, and multihoming are driving the development of new alternatives.'”

r0nc0 writes “My company (a Fortune 15 company) has recently required everyone that accesses the company portal to accept or decline an ‘agreement’ that governs the use of social networking. It basically states that any discussion of the company or any of the work that you do, whether at the office or at home, must be governed by their rules of social networking. Naturally these rules are that you never say anything bad or negative about the company, nor do you say anything bad or negative about anything. It’s presented like a EULA, but if you decline more than 3 times your manager is notified. Naturally I declined it each time until my manager complained to me about all the email he was getting about me not accepting the agreement, so I went ahead and accepted, knowing that anybody who cares would just post anonymously anyway. This is the first time I’ve run into a forced agreement about social networking, and the agreement is so broad that it can’t possibly be enforced. I’ve tried pointing out that agreements like that only drive people away and aren’t necessary anyway, but I might as well talk to a brick wall. Has anyone else out there run into social networking behavioral agreements like this?”

Windows 7 has been making headlines for a few months now. If you’ve read one or two of the stories and reviews dedicated to it, you might think that you know about all that it contains: new touchscreen features, a revamped taskbar with larger thumbnail previews, Internet Explorer 8, easier networking and so on. While that sounds reasonable enough

As instantaneous as the Web can be, most search engines–Google included–suffer from a bit of a time lag. Where Google leaves off, the new search engine, Scoopler looks to pick up. Scoopler is a search engine that indexes the content of a number of popular social-networking sites, and delivers real time search results:

Part of the power of social networking is the ability to form communities with like-minded individuals. But what happens when those communities are offensive to others? That issue is at the heart of attempts by a Dallas, Texas, attorney to have social-networking site Facebook remove pages for Holocaust deniers.

coondoggie writes “The Federal Trade Commission and Distributed Computing Industry Association locked horns over a proposed law that would govern how peer-to-peer networking technology would be used and regulated. Before the Subcommittee on Commerce, Trade, and Consumer Protection, the Federal Trade Commission expressed its doubts about companies protecting sensitive consumer information (PDF) or sensitive data over P2P internet file-sharing networks. It doesn’t help the P2P cause that the technology continues to pop up in bad practices. Recently a company that monitors peer-to-peer networks said it found classified information about the systems used onboard the president’s helicopter in a shared folder on a computer in Iran, after a file containing the data was accidentally leaked on a peer-to-peer network last summer. Meanwhile the DCIA said any laws would likely be ineffective and stifle the business opportunities P2P can generate.” An article on CNet points out that the wording of the bill would make it apply to just about everything related to communications on the internet.

Apple and Twitter are in serious negotiations over a possible 0 million sale of the social networking site, with the deal set to be announced in June if successful.The only question is: would it be called Twapple?